메뉴 건너뛰기




Volumn 37, Issue 1, 2009, Pages 25-36

Inferring undesirable behavior from P2P traffic analysis

Author keywords

Measurement; P2P

Indexed keywords

CLUSTERING TECHNIQUES; DDOS ATTACK; DOMAIN KNOWLEDGE; END-USERS; FILE-SHARING SYSTEM; FLOW-LEVEL; NETWORK OPERATOR; OFFLINE; P2P SYSTEM; PEER-TO-PEER SYSTEM; POINT OF PRESENCE; REAL TRAFFIC; SEMI-AUTOMATED; SYSTEMATIC ANALYSIS; TIME INTERVAL; TRAFFIC ANALYSIS; TRAFFIC CHARACTERISTICS; UNWANTED TRAFFIC; WEALTH OF INFORMATION;

EID: 70449643286     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1555349.1555353     Document Type: Conference Paper
Times cited : (26)

References (36)
  • 1
    • 70449691521 scopus 로고    scopus 로고
    • eMule forum :: Fake Server List And Ip Numbers. http://forum. emuleproject. net/index.php?showtopic=120066.
    • eMule forum :: Fake Server List And Ip Numbers. http://forum. emuleproject. net/index.php?showtopic=120066.
  • 2
    • 70449696028 scopus 로고    scopus 로고
    • eMule forum: Repeated Kad Errors. http://forum.emuleproject. net/index.php?showtopic=133799.
    • eMule forum: Repeated Kad Errors. http://forum.emuleproject. net/index.php?showtopic=133799.
  • 3
    • 84872710807 scopus 로고    scopus 로고
    • I-BlockList. http://www.IBlocklist.com.
    • I-BlockList
  • 4
    • 70449664335 scopus 로고    scopus 로고
    • Is the Skype outage really a big deal? http://news.cnet.com/8301-10784-3- 9761673-7.html.
    • Is the Skype outage really a big deal? http://news.cnet.com/8301-10784-3- 9761673-7.html.
  • 5
    • 40849119671 scopus 로고    scopus 로고
    • The P2P war: Someone is monitoring your activities
    • A. Banerjee, M. Faloutsos, and L. Bhuyan. The P2P war: Someone is monitoring your activities. In ScienceDirect, pages 1272-1280, 2008.
    • (2008) ScienceDirect , pp. 1272-1280
    • Banerjee, A.1    Faloutsos, M.2    Bhuyan, L.3
  • 6
    • 84869664065 scopus 로고    scopus 로고
    • Adunanza. http://www.adunanza.net/.
    • Adunanza
  • 7
    • 60649112960 scopus 로고    scopus 로고
    • Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
    • E. Athanasopoulos, K.G.Anagnostakis, and E. Markatos. Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. In ACNS, 2006.
    • (2006) ACNS
    • Athanasopoulos, E.1    Anagnostakis, K.G.2    Markatos, E.3
  • 8
    • 0141427794 scopus 로고    scopus 로고
    • P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. In IMW, 2002.
    • P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. In IMW, 2002.
  • 12
    • 84871950357 scopus 로고    scopus 로고
    • BitTorrent. http://www.bittorrent.org.
    • BitTorrent
  • 13
    • 33847636533 scopus 로고    scopus 로고
    • The Impact and Implications of the Growth in Residential User-to-User Traffic
    • K. Cho, K. Fukuda, and H. Esaki. The Impact and Implications of the Growth in Residential User-to-User Traffic. In SIGCOMM, 2006.
    • (2006) SIGCOMM
    • Cho, K.1    Fukuda, K.2    Esaki, H.3
  • 14
    • 56449096542 scopus 로고    scopus 로고
    • CISCO
    • CISCO. Cisco IOS NetFlow. http://www.cisco.com/web/go/netflow.
    • Cisco IOS NetFlow
  • 15
    • 44449130555 scopus 로고    scopus 로고
    • Finding Peer-To-Peer File-sharing Using Coarse Network Behaviors
    • M. Collins and M. Reiter. Finding Peer-To-Peer File-sharing Using Coarse Network Behaviors. In ESORICS, 2006.
    • (2006) ESORICS
    • Collins, M.1    Reiter, M.2
  • 16
    • 34247229209 scopus 로고    scopus 로고
    • F. Constantinou and P. Mavrommatis. Identifying Known and Unknown Peer-to-Peer Traffic. In NCA, 2006.
    • F. Constantinou and P. Mavrommatis. Identifying Known and Unknown Peer-to-Peer Traffic. In NCA, 2006.
  • 17
    • 70449691520 scopus 로고    scopus 로고
    • DC++. http://dcplusplus.sourceforge.net/.
    • DC++. http://dcplusplus.sourceforge.net/.
  • 18
    • 84876215464 scopus 로고    scopus 로고
    • BotTorrent: Misusing BitTorrent to launch DDoS attacks
    • K. Defrawy, M. Gjoka, and A. Markopoulou. "BotTorrent: Misusing BitTorrent to launch DDoS attacks". In SRUTI, 2007.
    • (2007) SRUTI
    • Defrawy, K.1    Gjoka, M.2    Markopoulou, A.3
  • 19
    • 70449660997 scopus 로고    scopus 로고
    • eMule. http://www.emule-project.net.
    • eMule. http://www.emule-project.net.
  • 20
    • 45749146270 scopus 로고    scopus 로고
    • A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise
    • M. Ester, H.-P. Kriegel, J. Sander, and X. Xu. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In KDD-96, 1996.
    • (1996) KDD-96
    • Ester, M.1    Kriegel, H.-P.2    Sander, J.3    Xu, X.4
  • 22
    • 70449681878 scopus 로고    scopus 로고
    • IPP2P. http://www.ipp2p.org.
    • IPP2P. http://www.ipp2p.org.
  • 26
    • 33746603312 scopus 로고    scopus 로고
    • Mining Anomalies Using Traffic Feature Distributions
    • A. Lakhina, M. Crovella, and C. Diot. Mining Anomalies Using Traffic Feature Distributions. In SIGCOMM, 2005.
    • (2005) SIGCOMM
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 27
    • 2442421260 scopus 로고    scopus 로고
    • Kademlia: A peer-to-peer information system based on the XOR metric
    • P. Maymounkov and D. Mazieres. Kademlia: A peer-to-peer information system based on the XOR metric. In IPTPS, 2002.
    • (2002) IPTPS
    • Maymounkov, P.1    Mazieres, D.2
  • 28
    • 9544246743 scopus 로고    scopus 로고
    • Measuring IP and TCP behavior on edge nodes with Tstat
    • M. Mellia, R. L. Cigno, and F. Neri. Measuring IP and TCP behavior on edge nodes with Tstat. Computer Networks, 47(1):1-21, 2005.
    • (2005) Computer Networks , vol.47 , Issue.1 , pp. 1-21
    • Mellia, M.1    Cigno, R.L.2    Neri, F.3
  • 29
    • 14344265818 scopus 로고    scopus 로고
    • Internet Traffic Classification Using Bayesian Analysis Techniques
    • A. Moore and D. Zuev. Internet Traffic Classification Using Bayesian Analysis Techniques. In SIGMETRICS, 2005.
    • (2005) SIGMETRICS
    • Moore, A.1    Zuev, D.2
  • 32
    • 84869687767 scopus 로고    scopus 로고
    • Prolexic. http://www.prolexic.com/content/moduleId/tPjJLKRF/ article/aRQNVcBH.html.
    • Prolexic
  • 33
    • 70449647203 scopus 로고    scopus 로고
    • J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy. Simple Traversal of User Datagram Protocol Through Network Address Translation STUN, 2003. RFC-3489.
    • J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy. Simple Traversal of User Datagram Protocol Through Network Address Translation STUN, 2003. RFC-3489.
  • 36
    • 36249028929 scopus 로고    scopus 로고
    • A Measurement Study of the Structured Overlay Network in P2P File-Sharing Applications
    • M. Zhou, Y. Dai, and X. Li. A Measurement Study of the Structured Overlay Network in P2P File-Sharing Applications. In ISM, 2006.
    • (2006) In ISM
    • Zhou, M.1    Dai, Y.2    Li, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.